• Title/Summary/Keyword: Protocol Performance

Search Result 3,196, Processing Time 0.028 seconds

Medium Access Control Protocol for Interconnection Network of Mobile System (이동통신 시스템의 상호연결망을 위한 접근제어 프로토콜)

    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.2
    • /
    • pp.95-108
    • /
    • 1999
  • The CDMA mobile system consists of several subsystems and each subsystem has many processing elements that handle voice messages and control messages for performing CDMA call processing functions through CDMA Interconnection Network(CIN). For assuring a high throughput and a short delay in the CIN, an efficient medium access control protocol should be provided. In this paper, we propose a new access control protocol of CIN for providing real time communications in CDMA mobile system. Also, we evaluate the delay performance of the proposed access control protocol and compare it with that of the existing access control protocol. Through a set of numerical examples, we show that our proposed protocol provides a better delay performance than the existing protocol.

  • PDF

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

Implementation of TTP Network System for Distributed Real-time Control Systems (분산 실시간 제어 시스템을 위한 TTP 네트워크 시스템의 구현)

  • Kim, Man-Ho;Son, Byeong-Jeom;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.6
    • /
    • pp.596-602
    • /
    • 2007
  • Recently, many ECUs(Electronic Control Units) have been used to enhance the vehicle safety, which leads to a distributed real-time control system. The distributed real-time control system requires to reduce the network delay for dependable real-time performance. There are two different paradigms by which a network protocol operates: event-triggered and time-triggered. This paper focuses on implementation of a time-triggered protocol. i.e. TTP/C(Time-Triggered Protocol/class C). This paper presents a design method of TTP control network and performance evaluation of distributed real-time control system using TTP protocol.

Formal Verification and Performance Analysis of New Communication Protocol for Railway Signaling Systems (철도 신호시스템을 위한 새로운 통신 프로토콜의 성능해석 및 검증)

  • 이재호;황종규;박용진;박귀태
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.53 no.6
    • /
    • pp.380-387
    • /
    • 2004
  • In accordance with the computerization of railway signaling systems, the interface link between the signaling systems has been replaced by a digital communication channel. At the same time, the importance of the communication link has become increasingly significant. However, there are some questionable matters in the current state of railway signaling systems in KNR. First, different communication protocols have been applied to create an interface between railway signaling systems although the protocols have the same functions. Next, the communication protocols currently used in the railway fields have some illogical parts such as structure, byte formation, error correction scheme, and so on. To solve these matters, the standard communication protocol for railway signaling systems is designed. The newly designed protocol is overviews in this paper. And the simulation is performed to analysis the performance of data link control for designed protocol. According to this simulation, it is identified that the link throughput of new protocol is improved about 10% and the frame error rate is improved than existing protocol. And it is verified the safety and liveness properties of designed protocol by using a formal method for specifying the designed protocol. It is expected that there will be an increase in safety, reliability and efficiency in terms of the maintenance of the signaling systems by using the designed communication protocol for railway signaling.

A Comparative Study of Feature Extraction Algorithm for unKnown Protocol Classification (비공개 프로토콜 분류를 위한 특징 추출 알고리즘 비교 연구)

  • Jung, YoungGiu;Jeong, Chang-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.251-255
    • /
    • 2019
  • On today, Protocol reverse-engineering technique can be used to extract the specification of an unknown protocol. However, there is no standardized method, and in most cases, the extracting process is executed manually or semi-automatically. If the information about the structure of an unknown protocol could be acquired in advance, it would be easy to conduct reverse engineering. the feature extraction is an important step in unknown protocol classification. However, in this paper, we present a comparison several feature extraction techniques and suggests a method of feature extraction algorithm for recognizing unknown protocol. In order to verify the performance of the proposed system, we performed the training using eight open protocols to evaluate the performance using unknown data.

Performance Analysis of Wired/Wireless Hybrid Network based on Common Industrial Protocol (Common Industrial Protocol 기반의 유무선 하이브리드 네트워크에 관한 성능 분석)

  • Jung, Ji-Won;Lee, Seung-Ki;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1119-1127
    • /
    • 2007
  • This paper is concerned with a performance analysis using a wired/wireless hybrid network based on Common Industrial Protocol(CIP). For the performance analysis, the data transmission time, average end-to-end delay and throughput between DeviceNet and the wireless devices are investigated. The experimental results show the performance in terms of the polling/COS service time of CIP based hybrid network.

Performance Evaluation of Network Protocol for Protocol for Crane System (자동화 크레인을 위한 네트워크 프로토콜의 성능 평가)

  • Nam Kyoung-Nam;Kim Man-Ho;Lee Kyung Chang;Lee Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.8
    • /
    • pp.709-716
    • /
    • 2005
  • As a way to build more efficient and intelligent container cranes for todays hub ports, communication networks are used to interconnect numerous sensors, actuators, controllers, and operator switches and consoles that are spatially distributed over a crane. Various signals such as sensor values and operator's commands are digitized and broadcast on the network instead of using separate wiring cables. This not only makes the design and manufacturing of a crane more efficient, but also easier implementation of intelligent control algorithms. This paper presents the performance evaluation of CAN(Controller Area Network), TTP(Time Triggered Protocol) and Byteflight that can be used for cranes. Through discrete event simulation, several important quantitative performance factors such as the probability of a transmission failure, average system delay (data latency) and maximum system delay have been evaluated.

Desing of the High-Perfrimance Group Transport Protocol To support QoS for Distributed Multimedia Application over ATM (ATM 상에서 분산 멀티미디어 응용을 위한 서비스 품질을 지원하는 고성능 그룹 트랜스포트 프로토콜 설계)

  • Song, Byeong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1059-1075
    • /
    • 1997
  • The transprot layer protocol for distrubuted multimedia applications in high speed network should gurantee the Quality of Serivce(QoS)requested by uwer.,The QoS Parmenters can be divied into two calssifications:those depend on the speed of a network such as bandiwidth,end-to-end transmission delay and throughput;and net- woek independent parameters such as various typed of group communications, retransmission method based on multimeda characteristic,acceptable packet wrror rate and transmission priority.In this proposed protocol,we divided user's QoS into performance redated parmeters and non-performance related parameters.The perform- ance-related paramenters are mapped into ATM traddic paramenters by the Distributed QoS Manger(DQM),the QoS manager,and the non-performance redlted paramenters are supported by the Distributed Multimedia Trans-port protocol(DMTP),a high-performance group transport protocol.Especially,becaues the DMTP is designed with considering the IP protocol,it can be efficiently used as an underlying protocol not onlu in ATM,but also in Ethernet,Token ring and FDDI LAN.

  • PDF

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.